Description
mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands.
Exploits (1)
References (6)
Core 6
Core References
Patch, Vendor Advisory vendor-advisory
x_refsource_freebsd
http://archives.neohapsis.com/archives/freebsd/2000-08/0336.html
Vendor Advisory vendor-advisory
x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2000-050.html
Various Sources x_refsource_misc
http://cvsweb.netbsd.org/bsdweb.cgi/basesrc/usr.sbin/mopd/mopd/process.c.diff?r1=1.7&r2=1.8&f=h
Vendor Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2000-08/0064.html
Various Sources vendor-advisory
x_refsource_openbsd
http://www.openbsd.org/errata.html#mopd
Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/1559
Scores
EPSS
0.1970
EPSS Percentile
95.5%
Details
Status
published
Products (9)
netbsd/netbsd
1.4.1
netbsd/netbsd
1.4.2
openbsd/openbsd
2.4
openbsd/openbsd
2.5
openbsd/openbsd
2.6
openbsd/openbsd
2.7
redhat/linux
6.0
redhat/linux
6.1
redhat/linux
6.2
Published
Oct 20, 2000
Tracked Since
Feb 18, 2026